CERT published a Vulnerability Note VU#391604, on my report for multiple vulnerabilities in ZTE ZXHN H108N R1A routers.
Just found that ZTE PSIRT posted an official statement on Nov 18, 2015:
Note: Large deployment size, primarily in Peru, used by TdP (Telefonica del Peru).
CWE-285: Improper Authorization - CVE-2015-7249
By default, only admin may authenticate directly with the web administration pages in the ZXHN H108N R1A. By manipulating parameters in client-side requests, an attacker may authenticate as another existing account, such asuser or support, and may be able to perform actions otherwise not allowed. For instance, while authenticated assupport, directly accessing http://<IP>/cgi-bin/webproc?getpage=html/index.html&var:menu=maintenance&var:page=accessctrl&var:subpage=accountpsdpermits changing the password of user.
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') - CVE-2015-7250
The webproc cgi module of the ZXHN H108N R1A accepts a getpage parameter which takes an unrestricted file path as input, allowing an attacker to read arbitrary files on the system.
CWE-798: Use of Hard-coded Credentials - CVE-2015-7251
In the ZXHN H108N R1A, the Telnet service, when enabled, is accessible using the hard-coded credentials 'root' for both the username and password.
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') - CVE-2015-7252
In the ZXHN H108N R1A, the errorpage parameter of the webproc cgi module is vulnerable to reflected cross-site scripting.
ImpactA LAN-based attacker can obtain credentials and configuration information, bypass authentication, access arbitrary files, and gain complete control of affected devices. Note that in some configurations, an external attacker may be able to leverage these vulnerabilities.
|The vendor has issued ZTE.bhs.ZXHNH108NR1A.k_PE to address the vulnerabilities affecting ZTE ZXHN H108N R1A. Users are encouraged to contact their Internet service provider for updates.
Note that W300 models are no longer officially supported and will not be receiving any updates. Users should consider the following workaround.
Since patches will not be issued to address vulnerabilities in W300 routers, users should strongly consider discontinuing use of affected devices. Users of ISP-provisioned W300 devices should request replacement routers.
CreditThanks to Karn Ganeshen for reporting these vulnerabilities.
This document was written by Joel Land.